Sidokanalsattacker mot HTTPS

Om någon kan avlyssna din förbindelse och se hur stora paket som skickas samt om den som avlyssnar även kan besöka https-sidan så är det möjligt för den som avlyssnar att lista ut vilka sidor du besöker.

Abstract. With software-as-a-service becoming mainstream, more and more applications are delivered to the client through the Web. Unlike a desktop application, a web application is split into browser-side and server-side components. A subset of the application’s internal information flows are inevitably exposed on the network. We show that despite encryption, such a side-channel information leak is a realistic and serious threat to user privacy. Specifically, we found that surprisingly detailed sensitive information is being leaked out from a number of high-profile, top-of-the-line web applications in healthcare, taxation, investment and web search: an eavesdropper can infer the illnesses/medications/surgeries of the user, her family income and investment secrets, despite HTTPS protection; a stranger on the street can glean enterprise employees’ web search queries, despite WPA/WPA2 Wi-Fi encryption. More importantly, the root causes of the problem are some fundamental characteristics of web applications: stateful communication, low entropy input for better interaction, and significant traffic distinctions. As a result, the scope of the problem seems industry-wide. We further present a concrete analysis to demonstrate the challenges of mitigating such a threat, which points to the necessity of a disciplined engineering practice for side-channel mitigations in future web application developments.

Dokumentet hittas här: informatics.indiana.edu/xw7/WebAppSideChannel-final.pdf

Via Bruce Schnier.

Surfa anonymt på Internet

Vi har många gånger tidigare skrivit hur du kan surfa anonymt på Internet men värt att poängtera är att enligt åtskilliga undersökningar så använder många dessa anonyma tjänster till att exempelvis utföra bankärenden på Internet och dylikt där den enskilde avslöjar sina uppgifter och således inte är anonym längre.

Det har även förekommit man-in-the-middle attacker på krypterad https-surf över nätverket Tor samt så har åtskilliga metoder presenterats för att avanonymisera de som surfar anonymt på Internet.

Referenser:

OpenSSL säkerhetsuppdatering

En ny version av det populära krypteringsbiblioteket OpenSSL finns nu ute. Denna version åtgärdar ett säkerhetsproblem som identifierats:

”Record of death” vulnerability in OpenSSL 0.9.8f through 0.9.8m
================================================================

In TLS connections, certain incorrectly formatted records can cause an OpenSSL client or server to crash  due to a read attempt at NULL.

Affected versions depend on the C compiler used with OpenSSL:

– If ’short’ is a 16-bit integer, this issue applies only to OpenSSL 0.9.8m.
– Otherwise, this issue applies to OpenSSL 0.9.8f through 0.9.8m.

Users of OpenSSL should update to the OpenSSL 0.9.8n release, which contains a patch to correct this issue. If upgrading is not immediately possible, the source code patch provided in this advisory should be  applied.

Bodo Moeller and Adam Langley (Google) have identified the vulnerability and prepared the fix.

OpenSSL finns som vanligt att ladda ner på openssl.org

John the Ripper

En ny version av lösenordsknäckningsprogrammet John the Ripper (JtR) finns nu ute i version 1.7.5 med följande förändringar och förbättringar:

* Support for the use of “–format” along with “–show” or “–make-charset” has been added.
* The choice of .rec and .log filenames for custom session names has been made more intuitive.
* A new numeric variable has been added to the word mangling rules engine: “p” for position of the character last found with the “/” or “%” commands.
* Support for “r” (character lists with repeats) and “p0″ (reference to the immediately preceding character list/range) has been added to the word mangling rules preprocessor.
* The undefined and undocumented behavior of some subtle word mangling rules preprocessor constructs has been changed to arguably be more sensible.
* Some bugs were fixed, most notably JtR crashing on no password hashes loaded (bug introduced in 1.7.4.2).

Uppdateringen hittas här: openwall.com/john

3G GSM KASUMI krypto knäckt

Nyss så släpptes nyheten att tre kryptogurus vid namn Orr Dunkelman, Nathan Keller samt Adi Shamir gjort mycket stora framsteg när det gäller att knäcka nästan generations GSM-krypto nämligen det för 3g vid namn A5/3 eller KASUMI.

KASUMI är en uppdaterad version av MISTY för att fungera bättre på den hårdvara som finns i mobiltelefoner men verkar på grund av denna modifiering blivit svagare.

Någon rapport finns ännu inte på IACR ePrint men förväntas dyka upp snart eftersom den börjat att cirkulera i privata kretsar.

Uppdatering: Finns nu att hämta här http://eprint.iacr.org/2010/013

Se mer:

threatpost.com/en_us/blogs/second-gsm-cipher-falls-011110

emergentchaos.com/archives/2010/01/another_week_another_gsm.html

768-bitars RSA faktoriserat

Nu har RSA med 768-bitar faktoriserats av ett antal forskare.

Factorization of a 768-bit RSA modulus

Thorsten Kleinjung and Kazumaro Aoki and Jens Franke and Arjen Lenstra and Emmanuel Thomé and Joppe Bos and Pierrick Gaudry and Alexander Kruppa and Peter Montgomery and Dag Arne Osvik and Herman te Riele and Andrey Timofeev and Paul Zimmermann

Abstract: This paper reports on the factorization of the 768-bit number RSA-768 by the number field sieve factoring method and discusses some implications for RSA.

Du hittar deras uppsats här:

http://eprint.iacr.org/2010/006

Intressant är följande citat:

Factoring a 1024-bit RSA modulus would be about a thousand times harder, and a 768-bit RSA modulus is several thousands times harder to factor than a 512-bit one.

Because the first factorization of a 512-bit RSA modulus was reported only a decade ago (cf. [7]) it is not unreasonable to expect that 1024-bit RSA moduli can be factored well within the next decade by an academic effort such as ours or the one in [7]. Thus, it would be prudent to phase out usage of 1024-bit RSA within the next three to four years.